商品描述

A clear, comprehensible, and practical guide to the essentials of computer cryptography, from Caesar's Cipher through modern-day public key. Cryptographic capabilities like detecting imposters and stopping eavesdropping are thoroughly illustrated with easy-to-understand analogies, visuals, and historical sidebars. The student needs little or no background in cryptography to read Cryptography Decrypted. Nor does it require technical or mathematical expertise. But for those with some understanding of the subject, this book is comprehensive enough to solidify knowledge of computer cryptography and challenge those who wish to explore the high-level math appendix.

First Attempt: A Database of Key/Serial Number Pairs. Second Attempt: An Encrypted Database of Key/Serial Number Pairs. Merkle's Insight: Individually Encrypted Key/Serial Number Pairs. Black Hat's Frustrating Problem. The Key to Public Key Technology.

A New Solution: Diffie-Hellman-Merkle Key Agreement.

Alice and Bob Openly Agree on a Secret Key. Problems with the Diffie-Hellman Method.

Separate Encryption and Decryption Keys. Review.

10. Confidentiality Using Public Keys.

New Twists on Old Security Issues. Confidentiality Assurances. Distribution of Public Keys. Two-Way Confidentiality. Review.

11. Making Public Keys: Math Tricks.

Alice's Easy Problem. Grade School Math Tricks. More Grade School Math. Division and Remainders: Modular Math. Modular Inverses. Using Modular Inverses to Make a Public Key. Putting It All Together.